TeamCISO - Helping Small Businesses stay Cyber Secure
  • Home
    • Book a free 30 minute Consultation
    • Promo 4G LTE HotSpot
  • vCISO
    • About the vCISO Service
    • Why you need a vCISO
    • SMB – Cyber Security Case Studies
    • Interim CISO
    • Our Advisors
  • Assessments
    • Mergers and Acquisitions
    • CyberSecurity Maturity
    • Threat Risk
    • Privacy Impact
    • Privileged Access
    • Penetration Testing
    • Network Architecture
    • Cloud Architecture
    • Cryptography
  • Breach
    • Breach Readiness Planning
    • Breach Tabletop Exercise
  • MDR
    • Intrusion Detection
    • Log Management
    • Endpoint Security Management
    • Threat Hunting
    • Vulnerability Scanning
    • Security Reporting
  • Blog
  • About Us
    • In the News
    • Happy Clients
    • Privacy Policy

Category Archives: Security

CISO, cybersecurity, privacy, Remote Work, Security, Security Operations Center, threat landscape, Threat Modeling

Working Remotely – Reality of...

  Working Remotely – Tackling the Reality of Loneliness and Depression   As a Virtual CISO,

  • Read More

August 22, 2019 Remote Work
CASB, cloud, cybersecurity, Infosec, perimeter, Security

Turmoil in the CASB market...

In April of last year, I wrote a technical comparison of the various players in the

  • Read More

July 12, 2016
arduino, cloud, Embedded, IIoT, IoT, raspberry pi, Security

Securing the Internet of Things...

The “Internet of Things” or “IoT” as it’s affectionately known, has become one of the most

  • Read More

June 13, 2016
COBIT, Governance, ISO27002, Maturity, Security

What is a Security Governance...

Regardless of what service or product your company produces, Information is your most critical asset. The

  • Read More

October 14, 2015
compliance, encryption, pci, Security, tokenization, zero trust

From Blueline to BlueZone –...

Last year, I wrote about a new Canadian company that had entered the Compliance Appliance market

  • Read More

September 25, 2015
Access Broker, CASB, cloud, cloud computing, cybersecurity, Infosec, Security

Understanding Cloud Access Security Broker...

Over the past 30 years, we the IT Security team have been promoting and building a

  • Read More

April 28, 2015
anomaly, apt, cloud, cybersecurity, Darktrace, network, Security, Security Operations Center, SOC

Giving your network a shot...

I understand that most of you reading this have never worked in a Security Operations Center

  • Read More

February 13, 2015
apt, breach, cyberark, jump servers, lateral access, malware, pass-the-hash, password, privilege, privileged access, rdp, Security, SSH

Risk reduction through Jump Servers

A common practice in today’s data centers is to allow Systems Administrators Remote Desktop  (RDP) or

  • Read More

November 8, 2014
attack, hsts, http, https, man-in-the-middle, proxy, Security, ssl, threat, tls

Eliminate HTTP Man-In-The-Middle attacks with...

The most prolific Internet Protocol (ok, maybe aside from mail) is HTTP, or common Web traffic,

  • Read More

October 29, 2014
cyberark, key pairs, private key, privileged access, public key, Security, SSH, ssh keys

CyberArk positioned to lead Industry...

CyberArk, best known for it’s Privileged Password Vault, and recent IPO success story has just announced

  • Read More

October 22, 2014

  • 1
  • 2
  • 3
  • Next

Breach the Keep

Breach Response Tabletop preparedness exercise for corporate executives. An exciting team building Cyber Security experience for problem solving during a breach or ransomware event.

GET BREACHED

Free 30 minute Consultation!

No obligations quick assessment
Book Now!

Virtual CISO Bi-Weekly Roundtable

Come join our bi-weekly roundtable of International Virtual/Fractional CISOs

vCISO Roundtable

Search

Cyber Security Links

  • 2019 Data Breaches
  • DarkReading
  • Microsoft Security Update Guide
  • Symantec: Internet Security Threat Report (ISTR) 2019

RSS Security Advisories

  • Atlassian security advisory (AV23-062)
  • F5 security advisory (AV23-061)
  • HPE security advisory (AV23-060)
  • [Control systems] Delta Electronics security advisory (AV23-059)
  • Ubuntu security advisory (AV23-058)
  • IBM security advisory (AV23-057)

RSS Security Awareness Tips

Twitter

@teamciso Follow

We are a collection of Virtual #CISO, here to help small companies get through their #CyberSecurity #Governance and #Compliance issues. #vCISO

teamciso
teamciso @teamciso @teamciso ·
24h

The latest TeamCISO CyberSecurity Daily! https://paper.li/teamciso/1562271239?share_id=62846a40-a336-11ed-ad57-fa163e65ae25 #cybersecurity #security

Reply on Twitter 1621240997244985346 Retweet on Twitter 1621240997244985346 Like on Twitter 1621240997244985346 Twitter 1621240997244985346
teamciso @teamciso @teamciso ·
1 Feb

The latest TeamCISO CyberSecurity Daily! https://paper.li/teamciso/1562271239?share_id=4aab7900-a26d-11ed-ad57-fa163e65ae25 #cybersecurity #security

Reply on Twitter 1620878740052971526 Retweet on Twitter 1620878740052971526 Like on Twitter 1620878740052971526 Twitter 1620878740052971526
teamciso @teamciso @teamciso ·
31 Jan

The latest TeamCISO CyberSecurity Daily! https://paper.li/teamciso/1562271239?share_id=0dd429b0-a1a4-11ed-ad57-fa163e65ae25 #cybersecurity #security

Reply on Twitter 1620516222486937600 Retweet on Twitter 1620516222486937600 Like on Twitter 1620516222486937600 Twitter 1620516222486937600
Load More

All content Copyright TeamCiso 2019

Theme : Consulting Company WordPress Theme